COMPUTER PERIPHERALS
MOBILE DEVICES AND SMARTPHONES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
link key
|
|
encryption code
|
|
link code
|
|
None of the above
|
Detailed explanation-1: -The security of Bluetooth uses the concept of two separate keys, an authentication key and an encryption key. The authentication key is the master key, and encryption keys are regenerated with each new session. A random number, generated for each transaction, adds additional security.
Detailed explanation-2: -Bluetooth uses a frequency-hopping spread spectrum to prevent this attack. Both of the communicating devices calculate a frequency-hopping sequence and the seed of the sequence is a function of the Bluetooth device address (BD ADDR) and the clock.
Detailed explanation-3: -Bluetooth security encryption can be easily broken Therefore, they need to “talk” to each other to decide on the key length. In Key Negotiation of Bluetooth (KNOB) attack, hackers intercept this process and make one of the devices “offer” to use a weak encryption key that can be as short as 1 byte.